• Title/Summary/Keyword: 개인 프로파일

Search Result 649, Processing Time 0.035 seconds

A Study of Construct Dictionary File for Password Recovery in Digital Forensics Investigation (디지털 포렌식 관점에서 패스워드 복구를 위한 사전 파일 구축 방안 연구)

  • Lim, Jong-Min;Kwon, Hyuk-Don;Choi, Jae-Min;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.155-158
    • /
    • 2008
  • 기술이 발전함에 따라 컴퓨터 범죄는 점차 증가하고 있으며, 용의자는 사건의 증거가 될 수 있는 파일들에 대해 패스워드 기능을 제공하는 응용프로그램을 활용하여 증거물에 대해 의도적인 접근을 막고 있다. 이로 인해 수사관은 암호화된 파일들에 대해 접근이 매우 어려운 상황이며, 해결 방안으로써 패스워드 복구 프로그램이 대안이 될 수 있다. 하지만 대다수의 패스워드 복구 프로그램들은 단순한 전수조사 공격 방식을 지원하거나 국가별 특징을 고려하지 않은 영문용 사전파일을 적용하여 복구하고 있기 때문에, 국내수사 환경에서 패스워드 검색에 한계가 따르고 있다. 따라서 수사관이 암호화된 파일에 대해 효율적으로 검색할 수 있는 방안이 필요하며, 이를 통해 빠른 시간 내에 증거물을 복구할 수 있는 방안이 강구되어야 한다. 본 논문에서는 최근 국내외 사전구축 사례 및 동향을 조사함으로써 효율적인 패스워드 사전 파일을 구축할 수 있는 방안을 제시하며, 이와 함께 용의자의 개인적인 정보를 이용하여 최적화된 사전파일을 생성할 수 있는 방안에 대해 설명한다.

  • PDF

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

Development of Bluetooth Protocol Stack on Embedded System (임베디드 시스템 상에서 블루투스 프로토콜 스택 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.123-128
    • /
    • 2004
  • Recent advancement in RF technology and wireless communications has enabled the development of noble networks. Bluetooth that can be used in various application field is a kind of WPAN(Wireless Personal Area Network) standard that is widely known. Bluetooth enables voice and data applications to operate simultaneously. Various applications have been implemented based on standard Profiles. In this paper, we describes the development of Biuetooth network AP(Access Point) system for network connection of Bluetooth devices. Unlike headset, mouse, and keyboard, the access point should have capability to support multiple connection and stabilized network throughput. We have designed and developed the hardware system, core stack and profiles on embedded system to comply with standard specification. Our system showed compatibility and good protocol performance through testing with lots of products that is available in market.

A proper folder recommendation technique using frequent itemsets for efficient e-mail classification (효과적인 이메일 분류를 위한 빈발 항목집합 기반 최적 이메일 폴더 추천 기법)

  • Moon, Jong-Pil;Lee, Won-Suk;Chang, Joong-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.33-46
    • /
    • 2011
  • Since an e-mail has been an important mean of communication and information sharing, there have been much effort to classify e-mails efficiently by their contents. An e-mail has various forms in length and style, and words used in an e-mail are usually irregular. In addition, the criteria of an e-mail classification are subjective. As a result, it is quite difficult for the conventional text classification technique to be adapted to an e-mail classification efficiently. An e-mail classification technique in a commercial e-mail program uses a simple text filtering technique in an e-mail client. In the previous studies on automatic classification of an e-mail, the Naive Bayesian technique based on the probability has been used to improve the classification accuracy, and most of them are on an e-mail in English. This paper proposes the personalized recommendation technique of an email in Korean using a data mining technique of frequent patterns. The proposed technique consists of two phases such as the pre-processing of e-mails in an e-mail folder and the generating a profile for the e-mail folder. The generated profile is used for an e-mail to be classified into the most appropriate e-mail folder by the subjective criteria. The e-mail classification system is also implemented, which adapts the proposed technique.

A System for Personalized Tour Recommendation Based on Ontology (온톨로지 기반의 개인화된 여행 추천 시스템의 구현)

  • Park, Yeonjin;Song, Kyunga;Whang, Jaewon;Chang, Byeong-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.1-10
    • /
    • 2015
  • We propose and implement a personalized tour recommendation system based on ontology. We utilize user's profile, dynamic information on search in the application, web search, and facebook for personalized recommendation. We construct tour database for England based on ontology for a demo service, and recommend tour spot considering an individual preference with tour database. This dynamic and personalized tour service makes it possible for individual to plan one's own tour by considering recommended tour spots for each individual.

Delay Spread Measurement and Analysis in 3 GHz and 6 GHz Indoor Environments (3 GHz, 6 GHz 실내 환경의 지연 확산 측정 및 분석)

  • Lee, Seong-Hun;Lee, Hwa-Choon;Cho, Byung-Lok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, delay diffusion for exhibition hall and conference room was measured and analyzed in the indoor environment of the building. Scenarios for the indoor environment of the two buildings were written. also, the system configuration and measurement methods were conducted under the same conditions. The measurement conditions were set to 3 GHz and 6 GHz of center frequencies and analysis band selected 2 GHz. The measurement system consisted of vector network analyzer, power amplifier, omni-directional transmit and receive antenna, and transmission line. According to the indoor environment scenario of the two buildings, the location of the receiving antenna was divided into three zones based on the location of the transmitting antenna and this was measured at 1 m intervals according to 18 locations. The power delay profiles, RMS delay spread, and K-factor results of two buildings were compared and analyzed.

Analysis technique to support personalized English education based on contents (맞춤형 영어 교육을 지원하기 위한 콘텐츠 기반 분석 기법)

  • Jung, Woosung;Lee, Eunjoo
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.55-65
    • /
    • 2022
  • As Internet and mobile technology is developing, the educational environment is changing from the traditional passive way into an active one driven by learners. It is important to construct the proper learner's profile for personalized education where learners are able to study according to their learning levels. The existing studies on ICT-based personalized education have mostly focused on vocabulary and learning contents. In this paper, learning profile is constructed with not only vocabulary but grammar to define a learner's learning status in more detailed way. A proficiency metric is defined which shows how a learner is accustomed to the learning contents. The simulational results present the suggested approach is effective to the evaluation essay data with each learner's proficiency that is determined after pre-learning process. Additionally, the proposed analysis technique enables to provide statistics or graphs of the learner's status and necessary data for the learner's learning contents.

Derivation of Representative Emotions Through Analysis of Perceived Frequency Profiles of Various Emotions According to Levels of Cognitive Well-Being (인지적 안녕감 수준에 따른 다양한 감정의 지각된 빈도 프로파일 분석을 통한 대표 감정 도출)

  • Dahye Han;Guk-Hee Lee
    • Science of Emotion and Sensibility
    • /
    • v.26 no.3
    • /
    • pp.83-100
    • /
    • 2023
  • This study determines whether the perception of the frequency of experiencing positive, negative, and surprise emotions changes according to the level of cognitive well-being. Furthermore, we determined practical means to analyze which emotions can be managed in daily life as an effective means of improving overall life satisfaction by identifying representative specific emotions that strongly predict the level of cognitive well-being. To this end, the between-subjects factorial design is adopted to measure the frequency of emotional experiences according to the level of cognitive well-being in 438 university undergraduate students. For cognitive well-being, the life satisfaction scale (SWLS) was used, and the PANAS-X scale was used to measure emotional frequency. As a result, first, the group with high cognitive well-being displays a higher frequency of positive and surprise emotional experiences and a lower frequency of negative emotional experiences than the group with low cognitive well-being. Second, the results confirm that representative emotions affecting cognitive well-being included 8 positive emotions, 7 negative emotions, and 1 surprise emotion. Among them, positive emotions include "happy" and "confident," negative emotions include "dissatisfied with self" and "disgusted with self," and surprise emotions include words such as "amazed." Therefore, we can conclude that the representative emotions are those with the greatest influence on cognitive well-being. Therefore, increasing the frequency of specific emotions (e.g., happy, confident, and surprise) and decreasing the frequency of others (e.g., dissatisfied with self and disgusted with self) could be effective in improving cognitive well-being than unconditionally examining emotions experienced in daily life.

Effect of different feeding times using a diet containing betaine on production, blood profile and a short chain fatty acid in meat ducks exposed to a scorching heat wave (베타인 사료의 급여시기가 폭염에 노출된 오리의 짧은 사슬지방산, 혈액 프로파일 및 생산성에 미치는 효과)

  • Bang, Han-Tae;Hwangbo, Jong;Kang, Hwan-Ku;Park, Byung-Sung
    • Journal of the Korean Applied Science and Technology
    • /
    • v.32 no.3
    • /
    • pp.427-438
    • /
    • 2015
  • The effects of different feeding times, using a diet containing 800 ppm betaine, on production, blood profile, and the short-chain fatty acid (SCFA), was investigated using 240 Cherry Valley (Anas platyrhynchos) meat ducks exposed to a scorching heat wave. The animals were randomly assigned to four groups, each of which was replicated three times with twenty ducks per replicate. The experimental period was 42 days for each group. Four groups were assigned into C (heat wave control group without betaine), T1 (ad libitum group fed a diet containing 800 ppm betaine), T2 (diet-restricted group fed twice daily between 05:00-10:00 and 17:00-20:00, using a diet containing 800 ppm betaine), and T3 (night-restricted group, fed from 17:00-10:00, with a diet containing 800 ppm betaine). At 42 days, body weight increased in order of T2, T1, T3 compared to the heat wave control group although. However, these differences were not found between the groups of T1 and T3. The heat wave control group, provided an ad libitum diet without betaine (C), showed an elevated feed conversion ratio compared to the groups fed a diet containing betaine. However, these differences were not found between the groups of T1, T2 and T3. RBC and platelet profiles except for PLT and MPV showed statistically significant differences between study groups fed a diet containing betaine. T2 presented significantly higher blood electrolytes $Na^+$ and $Cl^-$ than the other groups. T2 also showed a blood gas level that was generally higher than the other groups. Total SCFA, acetic acid and propionic acid concentration has been the increasing trend in T2, but butyric acid, isobutyric acid and valeric acid concentration has been the decreasing trend in T2 compared to the other groups. It is concluded that the feeding-restricted group, fed two times daily between 05:00-10:00 and 17:00-20:00, with a diet containing 800 ppm betaine may improve growth performance in meat ducks exposed to a scorching heat wave.

Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment (윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술)

  • Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.59-67
    • /
    • 2006
  • Recently the Personal Computer hacking and game hacking for the purpose of gaining an economic profit is increased in Windows system. Malicious code often uses methods which inject dll or code into memory in target process for using covert channel for communicating among them, bypassing secure products like personal firewalls and obtaining sensitive information in system. This paper analyzes the technique for injecting and executing code into memory area in target process. In addition, this analyzes the PE format and IMPORT table for extracting injected dll in running process in affected system and describes a method for extracting and analyzing explicitly loaded dll files related with running process. This technique is useful for finding and analyzing infected processes in affected system.

  • PDF